Gunes Acar
Gunes Acar
Postdoctoral research fellow at KU Leuven
Verified email at kuleuven.be
Title
Cited by
Cited by
Year
The web never forgets: Persistent tracking mechanisms in the wild
G Acar, C Eubank, S Englehardt, M Juarez, A Narayanan, C Diaz
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
4772014
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3042013
A critical evaluation of website fingerprinting attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1582014
The leaking battery: A privacy analysis of the HTML5 Battery Status API
L Olejnik, G Acar, C Casteluccia, C Diaz
Lecture Notes in Computer Science, 2015
66*2015
Dark patterns at scale: Findings from a crawl of 11K shopping websites
A Mathur, G Acar, MJ Friedman, E Lucherini, J Mayer, M Chetty, ...
Proceedings of the ACM on Human-Computer Interaction 3 (CSCW), 1-32, 2019
372019
How Unique is Your. onion? An Analysis of the Fingerprintability of Tor Onion Services
R Overdorf, M Juarez, G Acar, R Greenstadt, C Diaz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
332017
Shopping for privacy: Purchase details leaked to PayPal
S Preibusch, T Peetz, G Acar, B Berendt
Electronic Commerce Research and Applications 15, 52-64, 2016
282016
The Web’s Sixth Sense: A Study of Scripts Accessing Smartphone Sensors
A Das, G Acar, N Borisov, A Pradeep
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
242018
Browse at your own risk
N Nikiforakis, G Acar
IEEE Spectrum 51 (8), 30-35, 2014
202014
Web-based attacks to discover and control local IoT devices
G Acar, DY Huang, F Li, A Narayanan, N Feamster
Proceedings of the 2018 Workshop on IoT Security and Privacy, 29-35, 2018
142018
Facebook tracking through social plug-ins
G Acar, B Van Alsenoy, F Piessens, C Diaz, B Preneel
Belgian Privacy Commission, Ver 1, 2, 2015
142015
No boundaries: Exfiltration of personal data by session-replay scripts
S Englehardt, G Acar, A Narayanan
Freedom to tinker 15, 2017
132017
Leaky Birds: Exploiting Mobile Application Traffic for Surveillance
E Vanrykel, G Acar, M Herrmann, C Diaz
Financial Cryptography and Data Security - 20th International Conference, FC …, 2016
112016
Watching you watch: The tracking ecosystem of over-the-top TV streaming devices
H Mohajeri Moghaddam, G Acar, B Burgess, A Mathur, DY Huang, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
102019
Purchase details leaked to PayPal (Short Paper)
S Preibusch, T Peetz, G Acar, B Berendt
Financial Cryptography and Data Security - 19th International Conference, FC …, 2015
9*2015
A Platform for Creating Multimodal and Multilingual Spoken Corpora for Turkic Languages: Insights from the Spoken Turkish Corpus
Ş Ruhi, K Eryılmaz, G Acar
First Workshop on Language Resources and Technologies for Turkic Languages, 57, 2012
92012
Sustaining a corpus for spoken Turkish discourse: Accessibility and corpus management issues
Ş Ruhi, B Eröz-Tuğa, Ç Hatipoğlu, H Işık-Güler, G Acar, K Eryılmaz, H Can, ...
Language Resources: From Storyboard to Sustainability and LR Lifecycle …, 2010
92010
Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale
DY Huang, N Apthorpe, F Li, G Acar, N Feamster
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
72020
Obfuscation for and against device fingerprinting
G Acar
Symposium on Obfuscation, New York University, February 15, 2014, 0
3*
No boundaries: data exfiltration by third parties embedded on web pages
G Acar, S Englehardt, A Narayanan
Proceedings on Privacy Enhancing Technologies 4, 220-238, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20